Find Us Online:

PC World Reports By Lucian Constantin Jul 30, 2014 10:49 AM According to the researcher, another issue is that some antivirus products don’t digitally sign their updates and don’t use encrypted HTTPS connections to download them, which allows man-in-the-middle attackers to inject their own malicious files into the traffic that would get executed During his […]

July 30th, 2014, 16:53 GMT · By Ionut Ilascu A set of three zero-day vulnerabilities have been discovered in Symantec’s Endpoint Protection suite during a security auditing session at a company offering financial services. The evaluation was conducted by a team of experts from Offensive Security, creators of the Kali Linux penetration tool. They found […]

July 24th, 2014, 13:46 GMT · By Ionut Ilascu “They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me. I wonder if the higher ups at Apple really are aware of how much non-diagnostic personal information it copies out, wirelessly, bypassing backup encryption,” writes the expert on his blog. […]

by John Zorabedian on July 23, 2014 Again toys in a network should not be allowed How much of your personal data on your iPhone or iPad would you be willing to bet law enforcement or a hacker can grab from your device, even if you’ve encrypted it? How about all of it? A “backdoor” […]

July 18th, 2014, 14:46 GMT · By Ionut Ilascu Again another reason to use the new Web component on the managed services RMM (MspManagedNetwork) Security researchers have found a new malware, dubbed Mayhem, that targets Linux and FreeBSD web servers in order to turn them into bots, without requiring root access. Scary Three security experts, […]

Hard-to-remove malware locks devices and tries to make people pay $300 fines, says security firm Lookout FOLKS KEEP GOOGLE ANDROIDS OUT OF YOUR NETWORKS YOU ARE ASKING FOR PROBLEMS. Email Says: This device is locked due to the violation of the federal laws of the United States of America Article 161 and Article 148 ScarePakage […]

Folks the point of this article is if you have not already started using the new web component on the managed services (MspManagedNetwork), you may be rebuilding new machines for your clients which will not make them happy Crypto-Locker is not a joke. If you need help you know my email address and phone number, […]

July 15th, 2014, 23:37 GMT · By Ionut Ilascu ** “Millions of businesses are blindly trusting Active Directory as a foundation to their overall IT infrastructure. The unfortunate truth is that this trust is naively misplaced, leaving the vast majority of Fortune 500 enterprises and employees susceptible to a breach of personal and company data.” […]

July 9th, 2014, 15:35 GMT · By Ionut Ilascu List of weak passwords detected by IntelCrawler A new botnet has been discovered by security researchers, who observed that it uses the infected machines to scan for the presence of point-of-sale systems and gain access to the information through brute-force attacks. Los Angeles-based cyber threat intelligence […]